Whilst the KeyWatcher hardware utilises an independent database to process which user has access to which key and which keys it should restrict to specified users there is always a program that is used to administer all of this. There is also the events and alarms that take place at the hardware which generally needs to be available via a PDF or Excel type report for the end user to view and act upon accordingly. These events and alarms are then distributed through various notification channels such as Email or SMS.
There are currently three different platforms in which can be used to administer the different types of KeyWatcher and KeyBank hardware. Throughout the four generations of hardware since 1994 the software has seen many modifications and has had to adapt to maintain and support the many changes that Microsoft undergo with their supporting products such as .NET Framework and Message Queuing and SQL Server and many others.
The Software is also a channel to interface with third party products such as Access Control platforms, Online Vehicle Booking Systems and Contractor Management Terminals.
The diagram below breaks down the different platforms and the functionality available with each.